Analysis

  • max time kernel
    126s
  • max time network
    140s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-06-2024 14:44

General

  • Target

    gay porn.exe

  • Size

    78KB

  • MD5

    cd42fd3460fa3ce5e4893c656b6113d4

  • SHA1

    07978b4517bbd7103949c5677e466746e66bc768

  • SHA256

    3d59681a50a799e8b8d0c549bc4423250b963f17ab31e5a391906694fb227643

  • SHA512

    46e5d828ed0d0da7f35b593c3e1a16d1c8feb4de6e28c3058638ccb98ee8e8d7957a58de376f4a9a395a674214f31056641c2a57ca9bc729e27d0c2e3c634e02

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+XPIC:5Zv5PDwbjNrmAE+fIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE4NDE5NDc5MTI1NzQwNzU5OQ.Glvq6p.77zEt6mjUbAaKoLSgN3FYozePY669QO8nkgffg

  • server_id

    1252258792801046631

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gay porn.exe
    "C:\Users\Admin\AppData\Local\Temp\gay porn.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/332-0-0x00000134AE0A0000-0x00000134AE0B8000-memory.dmp

    Filesize

    96KB

  • memory/332-1-0x00007FFD88A13000-0x00007FFD88A15000-memory.dmp

    Filesize

    8KB

  • memory/332-2-0x00000134C86E0000-0x00000134C88A2000-memory.dmp

    Filesize

    1.8MB

  • memory/332-3-0x00007FFD88A10000-0x00007FFD894D2000-memory.dmp

    Filesize

    10.8MB

  • memory/332-4-0x00000134C9960000-0x00000134C9E88000-memory.dmp

    Filesize

    5.2MB

  • memory/332-5-0x00007FFD88A10000-0x00007FFD894D2000-memory.dmp

    Filesize

    10.8MB